Questions Frequently Asked

In this section I hope to answer as many questions as possible, that you may have about how I can be of service to you and your network.

How does the process work?

There are a series of steps involved. Starting, After you reach out.

  1. I will respond and we set up an initial meeting time. In-person preferred, but not strictly required.
  2. You fill out a form or tell me anything you know about the type of Internet Service Provider and Equipment you are currently using.
  3. I meet with you to discuss options for improving your network security and safety.
  4. Once we have agreed on the services you would like, I will take a partial pre-payment to cover any prep costs.
  5. When the service is complete we will perform (or schedule) a review session to confirm the work was done properly and to your satisfaction.
  6. Once you are satisfied, Final payment is to be provided upon receipt of final documentation.
  7. A final iunvoice will be generated for your records and be included in your final documentation.
  8. A receipt will be provide for each transaction.

What services do you offer?

We offer a wide range of services centered around family and business safety on the internet. We Specialize in making it harder for your family to get affected by Malware or to get to adult content. Specifically, children and the elderly or guests to your home or business.

Please, check out our services page for more information.

How safe does this make me?

This is like locking your doors at night. It is NOT 100% hacker proof. It will just make it harder to get in and deter folks from wanting to spend any more time or effort getting to your personal data, or holding your computers for ransom. A determined hacker that knows who you are, your job, or your assets will see you as a bigger target. Meaning the more you have, then the more they will spend time on trying to get in. That leaves a compelling reason to lock your internet’s doors to keep them out. I just want to make sure you know how to lock them and make sure you ask for ID any time someone comes knocking. Scammers and hackers are only getting better and better at fooling people into letting them in.

What is a system review?

Firstly, I make a comprehensive list of everything we can find that is attached to your network. Including but not limited to: computers, doorbells, lights, solar panel controls, cars, phones, TVs, and any other IoT devices you may have.

We review the list of items against what that your network knows about. There will be things on the list that are not present. E.G. grandparent’s or friends phones, etc. This is ok. We just want to make sure that everything you need is accounted for.

This becomes the backbone of your system documentation and serves as the starting state for us to compare against once all of your selected services are complete.

How long do we keep your documentation/information?

Documentation contains personal information and should be kept in a safe place of your choosing. I do not keep copies of this information for more than 15 days. Once you are satisfied and the 15 days have passed. I will purge the documents to protect your information.

I will retain your contact information for future communication, but I will not sell it to anyone.

Verified by MonsterInsights